General

  • Target

    New order.exe

  • Size

    702KB

  • Sample

    230519-psn9gsgf6x

  • MD5

    caecd32bcc0b7e065924dbf4c37a01e4

  • SHA1

    eb5e5e14b83ff5259f5908de1179cba4f41fe3df

  • SHA256

    0e77fc7adca97943ad5bca6f1cd20d05e80bcdda01b29087bf1d6fccd4379063

  • SHA512

    7f4c4e9089a45eeaac87359e0796613d56c5fdd54e91bc5d07f0cd6b1253c8b34d3ad269c1b79d6799cfd1e1fba2a2ee46b69b5bd1afabedddb7d0813a0f11ee

  • SSDEEP

    12288:zMqBG/uEspgx3NJx+FrfMzRWMZMYvXFt7F2yaKnS42klrcg:4qUEmdx+J4MuVtsqnxz

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6277498666:AAH4URlmeSysUKKZG20OTvrve55BRMLEu_o/

Targets

    • Target

      New order.exe

    • Size

      702KB

    • MD5

      caecd32bcc0b7e065924dbf4c37a01e4

    • SHA1

      eb5e5e14b83ff5259f5908de1179cba4f41fe3df

    • SHA256

      0e77fc7adca97943ad5bca6f1cd20d05e80bcdda01b29087bf1d6fccd4379063

    • SHA512

      7f4c4e9089a45eeaac87359e0796613d56c5fdd54e91bc5d07f0cd6b1253c8b34d3ad269c1b79d6799cfd1e1fba2a2ee46b69b5bd1afabedddb7d0813a0f11ee

    • SSDEEP

      12288:zMqBG/uEspgx3NJx+FrfMzRWMZMYvXFt7F2yaKnS42klrcg:4qUEmdx+J4MuVtsqnxz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks